Search dblp for Publications

export results for "toc:db/journals/jisys/jisys27.bht:"

 download as .bib file

@article{DBLP:journals/jisys/AliGR13,
  author       = {Syaiful Ali and
                  Peter F. Green and
                  D. Alastair Robb},
  title        = {Measuring Top Management's {IT} Governance Knowledge Absorptive Capacity},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {137--155},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50325},
  doi          = {10.2308/ISYS-50325},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/AliGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CaoNB13,
  author       = {Jian Cao and
                  Andreas I. Nicolaou and
                  Somnath Bhattacharya},
  title        = {A Longitudinal Examination of Enterprise Resource Planning System
                  Post-Implementation Enhancements},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {13--39},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50398},
  doi          = {10.2308/ISYS-50398},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CaoNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Chakraborty13,
  author       = {Vasundhara Chakraborty},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {333--335},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10334},
  doi          = {10.2308/ISYS-10334},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Chakraborty13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/CongR13,
  author       = {Yu Cong and
                  Jorge Romero},
  title        = {On Information Systems Complexity and Vulnerability},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {51--64},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50562},
  doi          = {10.2308/ISYS-50562},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/CongR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DavidsonDG13,
  author       = {Bruce I. Davidson and
                  Naman K. Desai and
                  Gregory J. Gerard},
  title        = {The Effect of Continuous Auditing on the Relationship between Internal
                  Audit Sourcing and the External Auditor's Reliance on the Internal
                  Audit Function},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {41--59},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50430},
  doi          = {10.2308/ISYS-50430},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DavidsonDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Debreceny13,
  author       = {Roger S. Debreceny},
  title        = {Research on {IT} Governance, Risk, and Value: Challenges and Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {129--135},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10339},
  doi          = {10.2308/ISYS-10339},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Debreceny13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DebrecenyG13,
  author       = {Roger S. Debreceny and
                  Glen L. Gray},
  title        = {{IT} Governance and Process Maturity: {A} Multinational Field Study},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {157--188},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50418},
  doi          = {10.2308/ISYS-50418},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DebrecenyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Dilla13,
  author       = {William N. Dilla},
  title        = {Can Avatars Fight Fraud? How Virtual Business Environments Facilitate
                  Learning More About Fraud Investigation and Prevention},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {127--130},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10371},
  doi          = {10.2308/ISYS-10371},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/Dilla13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DillaHMJ13,
  author       = {William N. Dilla and
                  Andrew J. Harrison and
                  Brian E. Mennecke and
                  Diane J. Janvrin},
  title        = {The Assets Are Virtual but the Behavior Is Real: An Analysis of Fraud
                  in Virtual Worlds and Its Implications for the Real World},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {131--158},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50571},
  doi          = {10.2308/ISYS-50571},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/DillaHMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/DuVZ13,
  author       = {Hui Du and
                  Miklos A. Vasarhelyi and
                  Xiaochuan Zheng},
  title        = {{XBRL} Mandate: Thousands of Filing Errors and So What?},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {61--78},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50399},
  doi          = {10.2308/ISYS-50399},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/DuVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/ElbashirCSDL13,
  author       = {Mohamed Z. Elbashir and
                  Philip A. Collier and
                  Steve G. Sutton and
                  Michael J. Davern and
                  Stewart A. Leech},
  title        = {Enhancing the Business Value of Business Intelligence: The Role of
                  Shared Knowledge and Assimilation},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {87--105},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50563},
  doi          = {10.2308/ISYS-50563},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/ElbashirCSDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/GaillyG13,
  author       = {Frederik Gailly and
                  Guido L. Geerts},
  title        = {Ontology-Driven Business Rule Specification},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {79--104},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50428},
  doi          = {10.2308/ISYS-50428},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/GaillyG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HaesGD13,
  author       = {Steven De Haes and
                  Wim Van Grembergen and
                  Roger S. Debreceny},
  title        = {{COBIT} 5 and Enterprise Governance of Information Technology: Building
                  Blocks and Research Opportunities},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {307--324},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50422},
  doi          = {10.2308/ISYS-50422},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HaesGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Heijden13,
  author       = {Hans van der Heijden},
  title        = {Evaluating Dual Performance Measures on Information Dashboards: Effects
                  of Anchoring and Presentation Format},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {21--34},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50556},
  doi          = {10.2308/ISYS-50556},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Heijden13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/HerouxF13,
  author       = {Sylvie H{\'{e}}roux and
                  Anne Fortin},
  title        = {The Internal Audit Function in Information Technology Governance:
                  {A} Holistic Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {189--217},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50331},
  doi          = {10.2308/ISYS-50331},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/HerouxF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/JanvrinPM13,
  author       = {Diane J. Janvrin and
                  Robert E. Pinsker and
                  Maureen Francis Mascha},
  title        = {XBRL-Enabled, Spreadsheet, or PDF? Factors Influencing Exclusive User
                  Choice of Reporting Technology},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {35--49},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50569},
  doi          = {10.2308/ISYS-50569},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/JanvrinPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/KwonUW13,
  author       = {Juhee Kwon and
                  Jackie Rees Ulmer and
                  Tawei Wang},
  title        = {The Association between Top Management Involvement and Compensation
                  and Information Security Breaches},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {219--236},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50339},
  doi          = {10.2308/ISYS-50339},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/KwonUW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/MoffittV13,
  author       = {Kevin C. Moffitt and
                  Miklos A. Vasarhelyi},
  title        = {{AIS} in an Age of Big Data},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {1--19},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10372},
  doi          = {10.2308/ISYS-10372},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/MoffittV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PickardBM13,
  author       = {Matthew D. Pickard and
                  Mary B. Burns and
                  Kevin C. Moffitt},
  title        = {A Theoretical Justification for Using Embodied Conversational Agents
                  (ECAs) to Augment Accounting-Related Interviews},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {159--176},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50561},
  doi          = {10.2308/ISYS-50561},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PickardBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/PrasadGH13,
  author       = {Acklesh Prasad and
                  Peter F. Green and
                  Jon Heales},
  title        = {On Governing Collaborative Information Technology {(IT):} {A} Relational
                  Perspective},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {237--259},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50326},
  doi          = {10.2308/ISYS-50326},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/PrasadGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SchobelD13,
  author       = {Kurt B. Schobel and
                  James S. Denford},
  title        = {The Chief Information Officer and Chief Financial Officer Dyad in
                  the Public Sector: How an Effective Relationship Impacts Individual
                  Effectiveness and Strategic Alignment},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {261--281},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50321},
  doi          = {10.2308/ISYS-50321},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SchobelD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SrivastavaRM13,
  author       = {Rajendra P. Srivastava and
                  Sunita S. Rao and
                  Theodore J. Mock},
  title        = {Planning and Evaluation of Assurance Services for Sustainability Reporting:
                  An Evidential Reasoning Approach},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {107--126},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50564},
  doi          = {10.2308/ISYS-50564},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/SrivastavaRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/SteinbartRGD13,
  author       = {Paul John Steinbart and
                  Robyn L. Raschke and
                  Graham Gal and
                  William N. Dilla},
  title        = {Information Security Professionals' Perceptions about the Relationship
                  between the Information Security and Internal Audit Functions},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {65--86},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50510},
  doi          = {10.2308/ISYS-50510},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisys/SteinbartRGD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/TegardenSD13,
  author       = {David P. Tegarden and
                  Ludwig Christian Schaupp and
                  Richard B. Dull},
  title        = {Identifying Ontological Modifications to the Resource-Event-Agent
                  {(REA)} Enterprise Ontology Using a Bunge-Wand-Weber Ontological Evaluation},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {105--128},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50429},
  doi          = {10.2308/ISYS-50429},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/TegardenSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Titera13,
  author       = {William R. Titera},
  title        = {Updating Audit Standard - Enabling Audit Data Analysis},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {325--331},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50427},
  doi          = {10.2308/ISYS-50427},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Titera13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Vasarhelyi13,
  author       = {Miklos A. Vasarhelyi},
  title        = {Formalization of Standards, Automation, Robots, and {IT} Governance},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {1--11},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10347},
  doi          = {10.2308/ISYS-10347},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Vasarhelyi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/WatanabeW13,
  author       = {Olena Watanabe and
                  Patrick Wheeler},
  title        = {Book Review},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {177--180},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-10351},
  doi          = {10.2308/ISYS-10351},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/WatanabeW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisys/Wilkin0MG13,
  author       = {Carla Wilkin and
                  John Campbell and
                  Stephen Moore and
                  Wim Van Grembergen},
  title        = {Co-Creating Value from {IT} in a Contracted Public Sector Service
                  Environment: Perspectives on {COBIT} and Val {IT}},
  journal      = {J. Inf. Syst.},
  volume       = {27},
  number       = {1},
  pages        = {283--306},
  year         = {2013},
  url          = {https://doi.org/10.2308/isys-50355},
  doi          = {10.2308/ISYS-50355},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisys/Wilkin0MG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}